#2021-09-14 22:20:06: client7: createExceptionInternal: !ERROR: MALException:mdb.getStackFrame:Illegal argument Illegal depth.
#2021-09-14 22:20:12: client21: createExceptionInternal: !ERROR: MALException:bat.partition:Illegal argument Illegal piece index
#2021-09-14 22:20:12: client28: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:20:12: client28: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:20:12: client34: createExceptionInternal: !ERROR: MALException:malInclude:could not open file: tokenizer: when opening tokenizer: open failed: No such file or directory

=================================================================
==2467495==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 7296 byte(s) in 191 object(s) allocated from:
    #0 0x7f1e2453f667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f1e2358f8ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f1e2358fb5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7f1e23e7e2cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7f1e23e7ea00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7f1e23e826e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7f1e23e88354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7f1e23e8b03d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7f1e23e8d227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7f1e23ea2409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7f1e23e9e1e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7f1e23e9e342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7f1e23e9e7fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7f1e23ea19a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7f1e23ea081c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7f1e240349d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7f1e2358e97c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #17 0x7f1e23685683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7f1e226d13f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 120 byte(s) in 4 object(s) allocated from:
    #0 0x7f1e2453f667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f1e2358f8ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f1e2358fb5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7f1e23e7e2cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7f1e23e7ea00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7f1e23e826e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7f1e23e8b067 in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7f1e23e8d227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7f1e23ea2409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7f1e23e9e1e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7f1e23e9e342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7f1e23e9e7fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7f1e23ea19a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7f1e23ea081c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7f1e240349d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7f1e2358e97c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #16 0x7f1e23685683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7f1e226d13f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 7416 byte(s) leaked in 195 allocation(s).